On February 17th the CNN published an interesting article, where some Syrian’s regime opponents claimed that the government was using a Trojan to monitor and disrupt the protestor’s network. Apparently the regime has been using a well-known social engineering technique: impersonate a trusted person then attack from the inside...

Occasionally, however, Reflector decompiled code allows us to remove only a portion of the
limitations targets we are working on exhibit, and we are therefore forced to get our hands dirty with
native code to complete our mission. One of these programs is Dxtory, which is currently at version

As of now, most of our tutorials are in italian, this is the first year we are opening to the whole world, so please, feel free to speak english in our forum/mailinglist. You are also encouraged to translate our pages in your language, so please don't be shy, send your tutorials for publishing and help us opening to the world.

UIC News

Temporary table :)

UIC lives on your donations only, if you like our effort, please support us